Results 311 to 320 of about 235,449 (333)
Some of the next articles are maybe not open access.

Nonmalleable Cryptography

SIAM Journal on Computing, 1991
The notion of nonmalleable cryptography, an extension of semantically secure cryptography, is defined. Informally, in the context of encryption the additional requirement is that given the ciphertext it is impossible to generate a different ciphertext so that the respective plaintexts are related.
Cynthia Dwork, Danny Dolev, Moni Naor
openaire   +3 more sources

Cryptography

Oberwolfach Reports, 2015
The Oberwolfach workshop Cryptography brought together scientists from cryptography with mathematicians specializing in the algorithmic problems underlying cryptographic security. The goal of the workshop was to stimulate interaction and collaboration that enables a holistic approach to designing cryptography from
Johannes A. Buchmann, Shafi Goldwasser
openaire   +1 more source

Randomness in Cryptography

2015
This talk is a short overview [This overview is partially based on the paper (Ballet and Rolland, Cryptogr. Commun. 3(4), 189–206, 2011)] on the use of randomness in cryptography. Firstly we give some indications on building and using the randomness and pseudo randomness in a cryptographic context.
openaire   +4 more sources

Cryptography and factorization methods in cryptography

2018
The Security of the RSA cryptosystem depends on the difficulty of finding the prime factors of large integers. Here we explore some of the factorization techniques currently available in cryptography. After giving an overview of cryptography we discuss some of the factorization techniques like Fermat’s factoring, Pollards p-1 method and continued
openaire   +2 more sources

Cryptography

2011
In this chapter, we discuss the use of cryptography. We go over the history of such tools, from very simple substitution ciphers to the fairly complex electromechanical machines that were used just before the invention of the first modern computing systems, and how they form the basis for many of our modern algorithms.
openaire   +3 more sources

Cryptography

IBM Journal of Research and Development, 1987
openaire   +2 more sources

Relativized cryptography

IEEE Transactions on Information Theory, 1979
It appears to be very difficult to give a formal definition of computational security for public-key cryptography. A slightly different notion, called transient-key cryptography, is defined for which a natural definition of security against chosen-plaintext attacks is given.
openaire   +3 more sources

A Cryptography Primer

2009
Publisher Summary Traditionally, cryptography has consisted of any means possible whereby communications may be encrypted and transmitted. This could be as simple as using a language with which the opposition is not familiar. Since the beginning of sentient language, cryptography has been a part of communication. It is as old as language itself.
openaire   +2 more sources

Fundamentals of Cryptography

2013
This chapter discusses how information security is the discipline that provides protection of information from intrusion and accidental or incidental loss. It also provides a framework for the protection of information from unauthorized use, copying, distribution, or destruction of data.
openaire   +3 more sources

Home - About - Disclaimer - Privacy